Trusted Solaris Installation and Configuration

Protect the Workstation

  1. Protect the PROM or the BIOS.

    See "How to Protect Machine Hardware" if you are unfamiliar with the steps.

  2. Limit network contact during booting.

    See the explanation and reference in "How to Limit Contact During Booting".